Communication - Journal Screen captures uploaded every day. Detailed descriptions of what you did each day
Knowledge and Understanding – Specific content acquired (software), and the comprehension of its meaning and significance (understanding)
Thinking – The use of critical and creative thinking skills and/or processes Application - of knowledge and skills (e.g., concepts, processes, use of equipment and technology) Monday May 2nd 2011:
Today I read a little bit of cisco netacad and then I worked on my scratch 1 and I finished. Relevant information: -Antennas:
Used on APs and Wireless bridges
Increases the output signal strength from a wireless device
Receives wireless signals from other devices such as STAs
Increase in signal strength from an antenna is known as the gain
Higher gains usually translate into increased transmission distances
-When building a wireless network, it is important that the wireless components connect to the appropriate WLAN. This is done using a Service Set Identifier (SSID).
- Ad-hoc
The simplest form of a wireless network is created by connecting two or more wireless clients together in a peer-to-peer network.
- Infrastructure Mode
Although an ad-hoc arrangement may be good for small networks, larger networks require a single device that controls communications in the wireless cell.
- The Basic Service Set (BSS) is the smallest building block of a WLAN.
- To expand the coverage area, it is possible to connect multiple BSSs through a Distribution System (DS). This forms an Extended Service Set (ESS). An ESS uses multiple APs. Each AP is in a separate BSS.
-Wireless technology uses an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA creates a reservation on the channel for use by a specific conversation. While a reservation is in place, no other device may transmit on the channel thus possible collisions are avoided.
- . This is known as a Request to Send (RTS). If the channel is available, the AP will respond to the device with a Clear to Send (CTS) message indicating that the device may transmit on the channel. A CTS is broadcast to all devices within the BSS. Therefore, all devices in the BSS know that the requested channel is now in use.
- Once the conversation is complete, the device that requested the channel sends another message to the AP known as an Acknowledgement (ACK). The ACK indicates to the AP that the channel can be released. This message is also broadcast to all devices on the WLAN. All devices within the BSS receive the ACK and know that the channel is once again available.
- Wireless Mode
Most home AP devices can support various modes, mainly 802.11b, 802.11g and 802.11n. Although these all use the 2.4 GHz range, each uses a different technology to obtain its maximum throughput.
- SID
The SSID is used to identify the WLAN. All devices that wish to participate in the WLAN must use the same SSID.
- Wireless Channel
The choice of channel for an AP must be made relative to the other wireless networks around it.
- A wireless host, or STA, is defined as any device that contains a wireless NIC and wireless client software. This client software allows the hardware to participate in the WLAN. Devices that are STAs include: PDAs, laptops, desktop PCs, printers, projectors and Wi-Fi phones.
Tuesday May 2nd 2011:
Relevant information: - One of the primary benefits of wireless networking is ease and convenience of connecting devices. Unfortunately that ease of connectivity and the fact that the information is transmitted through the air also makes your network vulnerable to interception and attacks. - MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network. When a wireless client attempts to connect, or associate, with an AP it will send MAC address information. - The use of a username and password is a most common form of authentication. - There are three types of wireless authentication methods: open authentication, PSK and EAP. - Open Authentication By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. - Wired Equivalency Protocol (WEP) Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air. WEP uses pre-configured keys to encrypt and decrypt data. - Wi-Fi Protected Access (WPA) WPA also uses encryption keys from 64 bits up to 256 bits. However, WPA, unlike WEP, generates new, dynamic keys each time a client establishes a connection with the AP. For this reason, WPA is considered more secure than WEP because it is significantly more difficult to crack. - When implementing a wireless network solution, it is important to plan before performing any installation. This includes: Determining the type of wireless standard to use Determining the most efficient layout of devices An installation and security plan A strategy for backing up and updating the firmware of the wireless devices - quiz
Wednesday May 3rd 2011:
Thursday May 5th 2011:
Today I did my chapter 7 test and I will do the retest later.
Friday May 6th 2011:
Today I stripped and made new rj-45 cables for the whole class.
ACHIEVEMENT CHART: TECHNOLOGICAL EDUCATION
Knowledge
Understanding
Thinking
Communication
Journal
Application
50–59% (Level 1)
60–69% (Level 2)
70–79% (Level 3)
80–100% (Level 4
*
Communication - Journal Screen captures uploaded every day. Detailed descriptions of what you did each day
Knowledge and Understanding – Specific content acquired (software), and the comprehension of its meaning and significance (understanding)
Thinking – The use of critical and creative thinking skills and/or processesApplication - of knowledge and skills (e.g., concepts, processes, use of equipment and technology)
Monday May 2nd 2011:
Today I read a little bit of cisco netacad and then I worked on my scratch 1 and I finished.
Relevant information:
-Antennas:
Used on APs and Wireless bridges
Increases the output signal strength from a wireless device
Receives wireless signals from other devices such as STAs
Increase in signal strength from an antenna is known as the gain
Higher gains usually translate into increased transmission distances
-When building a wireless network, it is important that the wireless components connect to the appropriate WLAN. This is done using a Service Set Identifier (SSID).
- Ad-hoc
The simplest form of a wireless network is created by connecting two or more wireless clients together in a peer-to-peer network.
- Infrastructure Mode
Although an ad-hoc arrangement may be good for small networks, larger networks require a single device that controls communications in the wireless cell.
- The Basic Service Set (BSS) is the smallest building block of a WLAN.
- To expand the coverage area, it is possible to connect multiple BSSs through a Distribution System (DS). This forms an Extended Service Set (ESS). An ESS uses multiple APs. Each AP is in a separate BSS.
-Wireless technology uses an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA creates a reservation on the channel for use by a specific conversation. While a reservation is in place, no other device may transmit on the channel thus possible collisions are avoided.
- . This is known as a Request to Send (RTS). If the channel is available, the AP will respond to the device with a Clear to Send (CTS) message indicating that the device may transmit on the channel. A CTS is broadcast to all devices within the BSS. Therefore, all devices in the BSS know that the requested channel is now in use.
- Once the conversation is complete, the device that requested the channel sends another message to the AP known as an Acknowledgement (ACK). The ACK indicates to the AP that the channel can be released. This message is also broadcast to all devices on the WLAN. All devices within the BSS receive the ACK and know that the channel is once again available.
- Wireless Mode
Most home AP devices can support various modes, mainly 802.11b, 802.11g and 802.11n. Although these all use the 2.4 GHz range, each uses a different technology to obtain its maximum throughput.
- SID
The SSID is used to identify the WLAN. All devices that wish to participate in the WLAN must use the same SSID.
- Wireless Channel
The choice of channel for an AP must be made relative to the other wireless networks around it.
- A wireless host, or STA, is defined as any device that contains a wireless NIC and wireless client software. This client software allows the hardware to participate in the WLAN. Devices that are STAs include: PDAs, laptops, desktop PCs, printers, projectors and Wi-Fi phones.
Tuesday May 2nd 2011:
Relevant information:
- One of the primary benefits of wireless networking is ease and convenience of connecting devices. Unfortunately that ease of connectivity and the fact that the information is transmitted through the air also makes your network vulnerable to interception and attacks.
- MAC address filtering uses the MAC address to identify which devices are allowed to connect to the wireless network. When a wireless client attempts to connect, or associate, with an AP it will send MAC address information.
- The use of a username and password is a most common form of authentication.
- There are three types of wireless authentication methods: open authentication, PSK and EAP.
- Open Authentication
By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are.
- Wired Equivalency Protocol (WEP)
Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air. WEP uses pre-configured keys to encrypt and decrypt data.
- Wi-Fi Protected Access (WPA)
WPA also uses encryption keys from 64 bits up to 256 bits. However, WPA, unlike WEP, generates new, dynamic keys each time a client establishes a connection with the AP. For this reason, WPA is considered more secure than WEP because it is significantly more difficult to crack.
- When implementing a wireless network solution, it is important to plan before performing any installation. This includes:
Determining the type of wireless standard to use
Determining the most efficient layout of devices
An installation and security plan
A strategy for backing up and updating the firmware of the wireless devices
- quiz
Wednesday May 3rd 2011:
Thursday May 5th 2011:
Today I did my chapter 7 test and I will do the retest later.
Friday May 6th 2011:
Today I stripped and made new rj-45 cables for the whole class.